Quantcast
Channel: CSO Online - Stories by Rob Enderle RSS feed
Browsing all 15 articles
Browse latest View live

False Lenovo Security Report Only Strengthens World's Top PC Maker

A report that Western nations deemed Lenovo PCs to be insecure was quickly kiboshed this week. CIO.com columnist Rob Enderle smells a rat and suspects it's only a matter of time before the source is...

View Article



Google's Invasions of Privacy, Free But Flawed Products Show Its Arrogance

Google is now admitting that its users shouldn't expect privacy when using Gmail. Meanwhile, a PC OEM says the free Android OS costs more, and causes more headaches, than Windows. Put this together,...

View Article

McAfee Moves to Redefine SIEM, Enterprise Security

Most security information event management systems can identify threats, but they can't remove them. All this does is put a bull's eye on a CIO's back. McAfee's new Enterprise Security Manager takes...

View Article

McAfee security report suggests 2014 will be a rough year

Smartphones, social networks, PCs, servers, cloud services, governments and national infrastructure all face security risks in 2014, according to the latest McAfee security report. On, and virtual...

View Article

McAfee Offers Global Response to Nationalized Malware

In medieval times, kings let barbarians break down the castle gates but made sure they paid the price once they got inside. McAfee's approach to security takes a similar approach -- since data breaches...

View Article


Everything you know about enterprise security is wrong

Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at the RSA Conference, you can't provide...

View Article

Lessons learned from the Apple-Google privacy fight

One of the fascinating things about the last decade was the iPhone. We had a market dominated by companies like Palm, RIM, Nokia and Samsung. Each was incredibly powerful in its segment and two were...

View Article

U.S. surveillance programs are killing the tech industry

The Information Technology & Innovation Foundation, ranked as the most authoritative science and technology think tank in the U.S. (second in the world behind Max Planck Institutes of Germany), has...

View Article


How to stop the security breach tsunami

It seems like almost every week there is a new security breach in either the government or in private business. The latest had nothing to do with China, instead it appeared to be more of a revenge...

View Article


Security threats and why you never want to name anything

There is a bit of a name fight going on with a new class of security software. Traditionally, this has been called UBA, for User Based Analysis or Analytics. However, recently newer firms are coming to...

View Article

Belgium attacks reinforce that security is everybody’s problem

In light of the tragedy in Belgium columnist Rob Enderle writes that it is more important than ever to rethink our security efforts. People seem to think security is someone else’s problem, but the...

View Article

New IoT security certification aims to make the world safer

Underwriters Laboratories new Cybersecurity Assurance Program (CAP) looks to certify Internet of Things products. Columnist Rob Enderle writes that these CAP certification will improve IoT security and...

View Article

Why the NSA should be considered a hostile agency

When an agency with security in its name chooses to exploit a security exposure rather than fix it, we have a problem, writes columnist Rob Enderle.

View Article


Why assuming data is secure is dangerous and stupid

The latest news concerning Hilary Clinton’s email has columnist Rob Enderle ticked off because it highlights an ongoing problem regarding security breaches, assuming we are secure.

View Article

How San Diego’s CISO battles cyberthreats

An overwhelming amount of ransomware and phishing attacks plague private and public companies. Columnist Rob Enderle writes how one CISO is successfully defending against the current threat landscape.

View Article

Browsing all 15 articles
Browse latest View live




Latest Images